Protect the weakest link of encryption

Dyadic applies a technology called secure Multiparty Computation to enable the storage and usage of cryptographic keys without ever having them in a single place, thereby eliminating the key as a single point of failure. This is being achieved practically by splitting a key into two random shares which are then stored on distinct, separate machines with high degree of segregation.

Each of these machines has a vHSM and each machine can use the cryptographic API that allows only encryption, decryption and signing. Key material export is impossible, as neither of the machines ever hold the key.

How does it work?

Generate a split key and keep refreshing the split.

Store the parts of the key in different servers.

Use the key without EVER bringing the parts together again

Attacks must obtain both parts simultaneously

At the core of Dyadic’s vHSM technology lies cutting-edge technology based on decades of advanced cryptographic research in secure multiparty computation (MPC).

It's not magic. It's math.

MPC Primer Whitepaper

Get an in-depth knowledge of how Dyadic uses MPC to secure keys with mathematically proven security guarantees. Learn what makes multiparty computation (MPC) protocols secure and how this is determined.

Magic of MPC On-Demand Webinar

Dyadic uses MPC to secure private keys, but did you know MPC has many other real world uses? Watch this on-demand webinar and find what these things have in common. Appropriate for MPC fans of any level!